@vigolium/piolium
v0.0.8
Published
Multi-phase security audits with specialist sub-agents, isolated context windows, capped concurrency, and resumable state — packaged as a Pi extension.
Maintainers
Readme

Piolium
Piolium is Vigolium's Pi-native repository security audit agent. It runs multi-phase source audits with specialist sub-agents, resumable state, controlled concurrency, PoC generation, and final reporting.
Piolium is packaged as a Pi extension. Once installed, it registers /piolium-* slash commands inside Pi sessions and also provides a standalone piolium launcher when installed through the quick installer.
[!WARNING] Full audit runs can take hours. Run Piolium only against repositories you trust or inside a sandboxed working directory.
Install
Piolium is a Pi package, so install Pi first if you don't have it:
bun add -g @earendil-works/pi-coding-agentRecommended — install Piolium into your Pi from npm:
pi install npm:@vigolium/pioliumThis registers the /piolium-* slash commands in your Pi sessions. Run them with pi -p "/piolium-balanced --fresh" or inside an interactive pi session.
From source (development)
For development from this checkout, you need Pi (the pi CLI) and Bun ≥ 1.1.0 already on your PATH:
bun install
pi install ./ # in-place dev install; edits in this checkout apply immediatelyQuick Start
Run an audit with a one-shot command:
pi -p '/piolium-deep'Or start an interactive pi session and type a command such as:
/piolium-deep ../target-repo --fresh
/piolium-statusCommands
| Command | Purpose |
| --- | --- |
| /piolium-help | Show commands, flags, and examples. |
| /piolium-status [path] | Show audit progress. |
| /piolium-lite [path] [--fresh] | Quick recon, secrets scan, and fast SAST. |
| /piolium-balanced [path] [--fresh] | Default audit with PoCs and report. |
| /piolium-deep [path] [--fresh] [P1..P17] | Full deep audit, optionally rerunning selected phases. |
| /piolium-confirm [path] [--fresh] [https://target] | Confirm existing findings live or with tests. |
| /piolium-diff [path] [--since=<sha>] | Scan changed files since an audited commit. |
| /piolium-revisit [path] [--fresh] | Anti-anchored second pass over an audit. |
| /piolium-merge [path] --dir=<tree> --dir=<tree> | Merge and dedupe result trees. |
| /piolium-export [path] [--format=json\|md-dir] | Export filtered findings with owner labels. |
| /piolium-learn [path] [--apply] | Suggest or apply project-local candidate matchers. |
| /piolium-smoke [path] [prompt] | Verify runner/provider wiring. |
| /piolium-longshot [path] [--fresh] [--limit=N] | File-by-file vulnerability hunt. |
Most commands accept an optional target directory as the first argument.
Deep mode phases
/piolium-deep runs 17 phases (P1–P17) in five stages. Pass phase ids to rerun only those (e.g. /piolium-deep . P4 P10):
- Recon & modeling —
P1intelligence & dependency risk,P2patch history & bypass review,P3architecture & threat model. - Analysis —
P4static analysis & triage,P5authorization & access control,P6state machine & concurrency,P7spec/parser/framework-contract gaps,P8manual attack-surface probe,P9cross-service data flow. - Adversarial validation —
P10adversarial review chamber,P11false-positive verification,P12variant search. - PoC & reporting —
P13proof-of-concept construction,P14per-finding report drafting,P15final report assembly,P16finding verification. - Cleanup —
P17removes transient workspaces and tool artifacts.
See docs/phase-reference.md for per-phase behavior and outputs.
Output
All audit artifacts are written under a piolium/ directory in the target repository:
piolium/
audit-state.json # resumable run state and per-phase status
attack-surface/ # durable knowledge base: recon, SAST, probes, threat model
findings-draft/ # candidate findings, named by the phase that produced them
findings/<id>-<slug>/ # final findings: draft.md, report.md, poc.*, evidence/
final-audit-report.md # consolidated report across finalized findings
tmp/piolium/runs/<id>/ # per-agent transcripts (removed by cleanup phases)Not every command writes every path — Lite skips the deep workspaces, while Deep adds the full attack-surface/ corpus plus variant-summary.md and, when findings confirm, confirmation-report.md. For a finished audit, start with final-audit-report.md, then each findings/<id>-<slug>/report.md.
Useful references:
- HACKING.md - technical setup, flags, retries, release, and development notes.
- docs/phase-reference.md - phase behavior and outputs.
- docs/output-structure.md - output directory layout.
Security Note
Pi packages execute code locally. Extensions run TypeScript, skills can ask the model to run shell commands, and Piolium's audit agents use filesystem and shell tooling. Treat Piolium as trusted local tooling and sandbox untrusted targets.
License
Piolium is made with ♥ by @j3ssie and it is released under the MIT license.
